Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14-10-2024 18:43
Static task
static1
Behavioral task
behavioral1
Sample
43a714ab0fa72eec45ec14ed3404da06_JaffaCakes118.dll
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
43a714ab0fa72eec45ec14ed3404da06_JaffaCakes118.dll
Resource
win10v2004-20241007-en
General
-
Target
43a714ab0fa72eec45ec14ed3404da06_JaffaCakes118.dll
-
Size
149KB
-
MD5
43a714ab0fa72eec45ec14ed3404da06
-
SHA1
1d08ad7c10f59092b49b0bf36b71931ff8d59845
-
SHA256
a04014e80818836a0f32cf9354f7de50bcb01798e45492be791e7e2cc248d7cd
-
SHA512
7aa0dd89b5b98cdd008fa961b04f9321b702d241b840fc63df624cfabbfbd19723618d4dcbe0bacdf42046be30871d4fa1611f871ffd13cf29bf5eaf597a2129
-
SSDEEP
1536:ONAYo+A1gC/T+lbnUpKC4YUtvv+iAbq0YDQLbzvI9utDMYvSTl5T40KdrwxSj6Ig:ONzoz/7Upm7WgMYGQjDg
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2536 wrote to memory of 224 2536 rundll32.exe 84 PID 2536 wrote to memory of 224 2536 rundll32.exe 84 PID 2536 wrote to memory of 224 2536 rundll32.exe 84
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\43a714ab0fa72eec45ec14ed3404da06_JaffaCakes118.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\43a714ab0fa72eec45ec14ed3404da06_JaffaCakes118.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:224
-